Skip to main content

CVE-2000-0154: The ARCserve agent in UnixWare allows local attackers to modify arbitrary files via a symlink attack

Low
VulnerabilityCVE-2000-0154cve-2000-0154
Published: Wed Feb 16 2000 (02/16/2000, 05:00:00 UTC)
Source: NVD
Vendor/Project: sco
Product: unixware

Description

The ARCserve agent in UnixWare allows local attackers to modify arbitrary files via a symlink attack.

AI-Powered Analysis

AILast updated: 07/01/2025, 03:27:49 UTC

Technical Analysis

CVE-2000-0154 is a vulnerability affecting the ARCserve agent running on UnixWare versions 7.1 and 7.1.1. The vulnerability arises from the agent's improper handling of symbolic links (symlinks) during its operations. Specifically, a local attacker with access to the UnixWare system can exploit this flaw by creating malicious symlinks that redirect the ARCserve agent's file operations to arbitrary files elsewhere on the filesystem. This symlink attack enables the attacker to modify files they would not normally have permission to alter. The vulnerability does not allow remote exploitation and requires local access with the ability to create symlinks. The CVSS score of 1.2 reflects the low severity, primarily because the attack complexity is high, no authentication is required, but the impact is limited to integrity (modification of files) without affecting confidentiality or availability. There is no patch available for this vulnerability, and no known exploits have been reported in the wild. The ARCserve agent is a backup software component, so the vulnerability likely occurs during backup or restore operations where file manipulation is involved.

Potential Impact

For European organizations still operating legacy UnixWare systems with ARCserve agent versions 7.1 or 7.1.1, this vulnerability poses a risk to file integrity. An attacker with local access could modify critical configuration files, scripts, or backup data, potentially leading to data corruption or unauthorized changes that could disrupt backup and recovery processes. While the impact on confidentiality and availability is minimal, the integrity compromise could hinder disaster recovery efforts or introduce persistent unauthorized changes. Given the age of the affected software, it is unlikely to be widely deployed in modern European IT environments, limiting the overall impact. However, organizations in sectors with legacy UnixWare deployments, such as industrial control, manufacturing, or specialized government systems, should be aware of this risk.

Mitigation Recommendations

Since no official patch is available, organizations should implement compensating controls. These include restricting local user permissions to prevent unauthorized symlink creation, especially in directories accessed by the ARCserve agent. Employ strict filesystem permissions and monitoring to detect suspicious symlink activity. Consider isolating UnixWare systems to limit local user access and enforce the principle of least privilege. If feasible, migrate backup operations to supported and updated platforms that do not exhibit this vulnerability. Regularly audit backup and restore processes to ensure integrity and detect anomalies. Additionally, implement file integrity monitoring on critical files to quickly identify unauthorized modifications.

Need more detailed analysis?Get Pro

Threat ID: 682ca32db6fd31d6ed7df838

Added to database: 5/20/2025, 3:43:41 PM

Last enriched: 7/1/2025, 3:27:49 AM

Last updated: 7/26/2025, 8:47:50 PM

Views: 12

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats